More on Noncommutative Polynomial Identity Testing

Size: px
Start display at page:

Download "More on Noncommutative Polynomial Identity Testing"

Transcription

1 More on Noncommutative Polynomial Identity Testing Andrej Bogdanov Hoeteck Wee Abstract We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient algorithms for the following problems in the noncommutative model: Polynomial identity testing: The algorithm gets as an input an arithmetic circuit with the promise that the polynomial it computes has small degree (for instance, a circuit of logarithmic depth or an arithmetic formula) and determines whether or not the output of the circuit is identically zero (as a formal expression). Unlike the algorithm by Raz and Shpilka, our algorithm is black-box (but randomized with one-sided error) and evaluates the circuit over the ring of matrices. In addition, we present query complexity lower bounds for identity testing and explore the possibility of derandomizing our algorithm. The analysis of our algorithm uses a noncommutative variant of the Schwartz-Zippel test. Minimizing algebraic branching programs: The algorithm gets as an input an algebraic branching program (ABP) and outputs a smallest equivalent ABP. The algorithm is based on Nisan s characterization of ABP complexity, and uses as a sub-routine an algorithm for computing linear dependencies amongst arithmetic formulas, a problem previously studied by the authors. 1 Introduction The problem of polynomial identity testing asks the following: Given a finite field F and a polynomial p F[x 1,..., x n ] computable by an arithmetic circuit, can we determine whether p is identically zero? 1 The celebrated lemma of Schwartz and Zippel [12, 14] shows that if p is nonzero, then p(a 1,..., a n ) is unlikely to evaluate to zero Computer Science Division, University of California, Berkeley. {adib, hoeteck}@cs.berkeley.edu. Work supported by US-Israel BSF Grant As in [10], we reserve the term identically zero to refer to a polynomial being identically zero as a formal expression. If a polynomial p evaluates to zero everywhere on the input domain, we say that p vanishes over the input domain. For instance, the bivariate polynomial p(x, y) = (x p 1)(y p 1) vanishes over F 2 p, but is not identically zero. if a 1,..., a n are chosen at random from a set of size slightly larger than the degree of p. No polynomial-time deterministic algorithm for the problem is known, even in the special case when p is computable by an arithmetic formula rather than a circuit. A formula is a circuit where every gate has fan-out one. Recently Raz and Shpilka [10] considered the noncommutative case of this problem. In the noncommutative scenario, p is a polynomial in the ring F{x 1,..., x n } of polynomials over noncommuting variables x 1,..., x n. Syntactically, a noncommutative circuit is exactly like a commutative arithmetic circuit, except that the inputs to the multiplication gates are ordered. Such a circuit represents a formal expression in F{x 1,..., x n }, and we ask whether this expression is identically zero. If p is identically zero as a noncommutative polynomial, then p is identically zero also when viewed as a commutative polynomial. However, the converse is not true; for example the commutator polynomial x 1 x 2 x 2 x 1 is identically zero in the commutative case, but nonzero in the noncommutative case. Raz and Shpilka showed that the class of noncommutative formulas admits a deterministic polynomial-time algorithm for polynomial identity testing by reducing the problem to identity testing for algebraic branching programs (ABPs) using a technique of Nisan s and then solving the problem for ABPs. Unlike the Schwartz-Zippel algorithm for the commutative case, the algorithm of Raz and Shpilka is non-black-box : While Schwartz-Zippel only uses the ability to evaluate the formula over its chosen input, Raz and Shpilka rely on the structure of the formula to determine whether it is identically zero. To our knowledge, for the more general case of noncommutative circuits very little is known; there seems to be no known algorithm, deterministic, randomized, or even nondeterministic, to test if the circuit computes the identically zero polynomial. 1.1 Our Contributions and Perspective We present a polynomial-time randomized algorithm for polynomial identity testing of noncommutative circuits, with the promise that the degree of the circuit is polynomial in its size. More generally, the running time is poly-

2 nomial in the circuit size, the degree and log F. Our algorithm is black-box and is based on a noncommutative variant of the Schwartz-Zippel test: We show that a polynomial p in F{x 1,..., x n } of degree d is unlikely to evaluate to zero when the formal variables are replaced with sufficiently large matrices over F or an extension of F. When the input is a noncommutative formula, our algorithm can be implemented in randomized NC using the standard technique of parallel formula evaluation. (However, this implementation is no longer black-box.) Parallel evaluation of arithmetic formulas is well known in the commutative setting [3, 4]; the approach easily extends for arithmetic formulas over rings of matrices. 2 We suspect that when the input to our algorithm is a noncommutative formula, it may be possible to obtain a partial derandomization of our algorithm that uses only a polylogarithmic (in the formula size) number of random bits. Roughly, if one can show that no bivariate polynomial p F{x, y} computed by a formula of size s is a polynomial identity for matrices of dimension ω(log s), then our randomized algorithm will use only O(log 3 s) bits of randomness. We do not know of an example that violates this conjecture, and in Section 6 we show that certain well known classes of identities satisfy it. For the case of general noncommutative circuits (with no promise on the degree of the circuit), our argument merely yields that the problem is in corexp. While this observation is not trivial (since a circuit can compute a noncommutative polynomial with a doubly exponential number of terms), it is far from satisfactory, as no hardness result about this problem is known. We show lower bounds (Section 4.2) which imply that any evaluation-based algorithm over algebras of dimension 2 o(s) whose proof of correctness treats the circuit as a black box computing a polynomial of degree 2 O(s) cannot do better. Therefore, to obtain an improved black-box algorithm for identity testing of general noncommutative circuits, one needs to either evaluate over an algebra of exponential dimension that admits some efficient implicit representation (compatible with addition and multiplication), or use properties of noncommutative circuits other than bounds on the degree and the number of variables of the polynomial computed by the circuit in the analysis. This may be compared with a result by Kabanets and Impagliazzo [7] in the commutative setting, where they show a quasipolynomial derandomization of polynomial identity testing under the assumption that there exists an exponential-time computable family of multilinear polynomials that requires subexponential size arithmetic circuits. The difficulty in resolving such an assumption stems from our inability to prove arithmetic lower bounds for general 2 Brent s paper references a report by Maruyama [8] that extends his results over rings of matrices. circuits. In contrast, lower bounds for noncommutative formulas are easy to prove; however we were unable to show a good bound for the class of all polynomial identities of k k matrices, or to find a counterexample. We also present a new application of noncommutative polynomial identity testing in the context of minimizing algebraic branching programs (ABPs), starting from the Raz- Shpilka identity testing algorithm for ABPs. Although a minimization algorithm generalizes an identity testing algorithm in the context of ABPs 3, our work does not subsume the Raz-Shpilka algorithm, since we use their algorithm as a subroutine to compute linear dependencies amongst arithmetic formulas. (The latter problem previously surfaced in our work on hypercube linearity testing [2].) Our minimization algorithm builds on Nisan s characterization of ABP complexity [9]. In particular, Nisan s characterization is constructive, as it yields an ABP of size equal to the lower bound. Our algorithm may be seen as an efficient realization of Nisan s construction. To our knowledge, this is the first polynomial-time minimization algorithm for models outside of finite automata. 1.2 Additional Related Work Motivated by the study of algebraic algorithms for approximating the permanent, Chien and Sinclair [5] extended Nisan s formula lower bound methods to obtain exponential ABP lower bounds for the permanent and the determinant in a very large class of noncommutative algebras with polynomial identities, or PI-algebras. They do not address the question of polynomial identity testing in PIalgebras, namely whether a given polynomial with coefficients in some field F vanishes over a PI-algebra containing F. For polynomial identity testing in the black box model, the case of PI-algebras is easier than the case of the free noncommutative algebra. Our methods extend trivially to give randomized identity testing algorithms over any PIalgebra in which addition and multiplication of algebra elements is computable in time polynomial in the representation of the elements. As an interesting open problem, we note that there is no known deterministic algorithm for arithmetic formula identity testing in PI-algebras (even for special cases like the algebra of 2 2 matrices). In particular, the Raz-Shpilka algorithm does not extend to this case. 2 Preliminaries Let F be a field, and we write F{x 1,..., x n } to denote the set of polynomials with coefficients from F over 3 A minimal ABP computing the identity must have some edge labelled with the zero function and therefore we can always use a minimization algorithm to solve identity testing for ABPs, even if the minimization algorithm does not output a canonical minimal ABP.

3 noncommuting variables x 1,..., x n. A polynomial p F{x 1,..., x n } is homogeneous if all its terms have the same total degree. We say p is multilinear if it is homogeneous of degree n with n variables, and the individual degree of all its variables is one. This means that a multilinear polynomial p has the form p(x 1,..., x n ) = σ Per(n) α σx σ(1)... x σ(n), where Per(n) denotes the set of all permutations σ : [n] [n]. Arithmetic circuits. An arithmetic circuit over a field F represents a multivariate polynomial in the obvious way: a multiplication (addition) gate outputs the product (sum) of the formal polynomials represented by its input. (We may also allow generalized addition gates that, on input f, g, compute arbitrary linear combinations af + bg, where a, b F.) The input wires to the circuit correspond to the input variables of the polynomial and the output of the circuit computes some polynomial of the input variables. We measure the size of an arithmetic circuit as the number of gates. An arithmetic circuit is called a formula if the fanout of every gate in the circuit is at most one. Black-box evaluations of polynomials. Given a polynomial p over noncommuting variables over F, we allow evaluations p over extension fields of F, and more generally, any associative algebra over F. Evaluating p over a noncommutative algebra is in fact necessary for black-box noncommutative polynomial identity testing. We stress that it is reasonable to ask for values of the polynomials where the input comes from an algebra over F because the polynomial is given to the algorithm in the form of an arithmetic circuit. 3 Polynomial Identities Let F be a field and A be an associative algebra with identity over F. The dimension of A over F is the dimension of A as an F-vector space. Given a set S A and a polynomial p F{x 1,..., x n }, we call p a polynomial identity (in short, PI) for S if for all a 1,..., a n S, p(a 1,..., a n ) = 0. We say S satisfies a PI if some nonzero p is a PI for S. We will be particularly interested in the special case when A is the set of k k matrices over F itself, or over some field extension F over F. We denote the space of k k matrices over F by F k k. The (i, j)th unit matrix e ij, where 1 i, j k is the matrix in F k k whose (i, j)th entry is 1 and whose other entries are zero. Let S k (F) denote the linear subspace of F k k consisting of all matrices whose entries are all zero except along the main and second upper diagonal. Alternatively, S k (F) is the linear space spanned by the unit matrices e ii, 1 i k and e i(i+1), 1 i k 1. For T F and L(F) a space of matrices generated by some of the unit matrices e ij, we denote by L(T ) the set of matrices in L(F) all of whose entries are in T. We state two lemmas that are standard in the theory of polynomial identities. Similar statements can be found, for example, in the books by Rowen [11] or Drensky and Formanek [6]. Lemma 3.1. Let F be an arbitrary field, F an extension of F, S a linear subspace of F k k. If there exists a PI for S of degree d over F then there exists a multilinear identity for S of degree at most d over F. Proof. For an arbitrary polynomial p F {x 1,..., x n }, the linearization of p with respect to x 1 is the polynomial (in n + 1 variables) p 1 (y 11, y 12, x 2,..., x n ) = p(y 11 + y 12, x 2,..., x n ) p(y 11, x 2,..., x n ) p(y 12, x 2,..., x n ). The linearization p i of p with respect to x i is defined likewise. Note that p i has the following properties: 1. The total degree of p i does not exceed the total degree of p. 2. If x i has degree d i > 1 in p, then y i1, y i2 have degrees exactly d i 1 in p i. (In particular, if p 0 then p i 0.) 3. If x i has degree one in p, then p i consists of those terms of p that do not contain x i, with a change in sign. In addition, if p is a PI for S, then p i is a PI for S as well. This suggests the following procedure: Starting with p, find a variable x i in p such that either its degree is strictly greater than one or x i does not appear in all terms of p. Replace p with p i and repeat. By the above properties, the procedure must terminate with a multilinear identity for S of degree at most d. In particular, property 2 ensures that the individual degree of every variable in the final polynomial is one, and property 3 ensures that every variable appears in every monomial. The Amistur-Levitzki Theorem [1] states that over any field F, the matrix algebra F k k satisfies no PI of (total) degree less than 2k, and satisfies exactly one (up to constant factor) multilinear identity of degree 2k. We use a slight generalization of the first part of the Theorem, which we state below. Lemma 3.2. For arbitrary F, S k (F) does not satisfy any PI of degree 2k 1 or less. Notice that the statement holds for PIs with an arbitrary number of variables.

4 Proof. Suppose that S k (F) satisfies an identity of degree 2k 1 or less. By Lemma 3.1, S k (F) must satisfy a multilinear identity of degree n 2k 1. This identity has the form p(x 1,..., x n ) = σ Per(n) α σx σ(1)... x σ(n), where α σ F. Fix σ and consider the substitution x σ(1) = e 11, x σ(2) = e 12, x σ(3) = e 22, x σ(4) = e 23,... where we choose consecutive entries by walking along a staircase. The only term of p that does not vanish under this substitution is the term α σ x σ(1)... x σ(n) = α σ e 1r, where r = n/2 k. Since p is a PI for S k (F), we must have α σ = 0. It follows that p is identically zero. 4 Noncommutative Identity Testing Let P n,d (F) denote the class of (noncommutative) polynomials over F of degree d in variables x 1,..., x n, excluding the zero polynomial. Note that in the problem of polynomial identity testing, we are interested in whether the polynomial is identically zero as a formal expression. 4.1 A black-box randomized algorithm Our algorithm gets as an input an arithmetic circuit with the promise that the polynomial p it computes has small degree (for instance, a circuit of logarithmic depth or an arithmetic formula). The high-level idea is as follows: we evaluate p on random k k matrices over some field F and for a sufficiently large k. F is a field extension of F, with F d. We regard each entry of the matrix in F k k as an indeterminate, and we view the k 2 indeterminates as commuting variables. Upon substitution, p computes a k k matrix wherein each entry is a polynomial in k 2 (commuting) variables. If p is not a PI for F k k, then some entry of p computes a nonzero polynomial of degree at most d over F. In particular, if we pick a random matrix, p will compute a nonzero matrix with high probability, and we may obtain a lower bound for this probability via commutative Schwartz- Zippel. In order to optimize the parameters, we will pick random matrices from a linear subspace L k of F k k, where some entries of the matrix are fixed as 0 and the remaining entries are chosen randomly from some subset T of F. Lemma 4.1 (Noncommutative Schwartz Zippel). Let p F{x 1,..., x n } be a polynomial of degree d, F be an extension of F, L k be a linear subspace of F k k generated by an arbitrary subset of the unit matrices e ij, and T F. Then either p is a PI for L k, or Pr[p(M 1,..., M n ) = 0] d/ T, where M 1,..., M n are chosen independently at random from L k (T ). Proof. Let e 1,..., e k 2 denote a basis of F k k over F, chosen in such a way that the first l vectors e 1,..., e l are the unit matrices that generate L k. Consider the polynomial q F{y 11,..., y nl } which is the image of p under the substitutions x i = y i1 e y il e l. Informally, q is a k k matrix where each matrix entry computes a polynomial q i (1 i k 2 ) in F[y 11,..., y nl ]. We can therefore (uniquely) rewrite q in the form q(y 11,..., y nl ) = k 2 j=1 q j(y 11,..., y nl )e j, where q 1,..., q k 2 are commutative polynomials in F[y 11,..., y nl ]. Moreover, it is easy to check that if p has degree d, then each q j has degree at most d. If all of the polynomials q 1,..., q k 2 are identically zero, then p is identically zero, so p is a PI for L k. Otherwise, one of q 1,..., q k 2 (say q 1 ) is nonzero. By the commutative Schwartz-Zippel Lemma, q 1 (a 11,..., a nl ) remains nonzero with probability 1 d/ T under a random substitution y ij = a ij T. Choosing random matrices M 1,..., M n L k (T ) amounts exactly to choosing random values a ij T, so it follows that p(m 1,..., M n ) 0 with at least the same probability. Theorem 4.2. There exists a black-box, randomized identity testing algorithm for the class P n,d that uses O(d log n log(d log n/ɛ)) random bits and succeeds with probability 1 ɛ. Proof. Let F be an extension of F (or perhaps F itself) of size at least d log n/ɛ, and let T be a subset of F of size d log n/ɛ. Without loss of generality, suppose n is a power of two, and let b i1 b i2... b i log n {0, 1} log n denote the (padded) binary representation of i 1, for 1 i n. Let k = d log n/2. Our algorithm for polynomial identity testing does the following: 1. Choose random matrices M 0, M 1 S k (T ). 2. For 1 i n, let N i = log n j=1 M b ij. 3. Accept if p(n 1,..., N n ) evaluates to 0, and reject otherwise. Let q(y 0, Y 1 ) be the polynomial obtained from p(x 1,..., X n ) after performing the substitution X i = log n j=1 Y b ij. We remark that q is not identically zero, as any monomial of q has a unique pre-image in p. Moreover, q has degree at most d log n, so q P 2,d log n. By Lemma 4.1, either q is a PI for S k (F), or q(m 0, M 1 ) 0 with probability 1 ɛ. By Lemma 3.2, q cannot be a PI for S k (F), so the latter must hold.

5 4.2 Lower bounds on query complexity Theorem 4.3. Let A be an associative algebra with identity of dimension k over F. Any deterministic black-box algorithm for testing P n,d that evaluates over A must make at least n d /k queries. The lower bound holds for both adaptive and nonadaptive queries. Proof. Let e 1,..., e k be a basis for A as an F-vector space. Given a set of elements a ij A, 1 i q, 1 j n, where q < n d /k, we exhibit a polynomial p P n,d such that for all 1 i q, p(a i1,..., a in ) = 0. Write p(x 1,..., x n ) = s [n] d β sx s1 x sd, where β s F are indeterminates. For each s [n] d, a is1 a isd A, so we may write a is1 a isd = k l=1 a isle l. Upon substitution, we obtain: p(a i1,..., a in ) = s [n] d β s = k l=1 k l=1 a isle l ( s [n]d a islβ s ) e l. The equation p(a i1,..., a in ) = 0 is equivalent to the set of linear constraints: For all 1 l k, s [n] d a islβ s = 0. Taking the constraints over all possible i = 1, 2,..., q, we have a system of qk linear constraints over the variables β s. Since there are n d distinct β s and n d > qk, there exists a nonzero solution for the system. This specifies a nonzero polynomial p P n,d that vanishes on all queries. Corollary 4.4. Let A be an associative algebra with identity of dimension k over F. Any randomized black-box algorithm using R random bits and Q queries for testing P n,d by evaluating over A satisfies R + log Q d log n log k. Any efficient algorithm can conceivably only compute over algebras with poly(n) dimensions, so for d = ω(1), we have a lower bound of Ω(d log n) for R + log Q. Our algorithm from Theorem 4.2 achieves Θ(d log n), which is tight up to polylogarithmic factors. 5 Minimizing ABPs Definition 5.1 ([9]). An algebraic branching program (ABP) is a leveled directed acyclic graph with one vertex of in-degree zero, which is called the source, and one vertex of out-degree zero, which is called the sink. The vertices of the graph are partitioned into levels numbered 0,..., d. Edges are labeled with a homogeneous linear function in the input variables, and may only connect vertices from level i to vertices from level i + 1. The source is the only vertex at level 0 and the sink is the only vertex at level d. Finally, the size of the ABP is the number of vertices in the graph. The polynomial that is computed by an ABP is the sum over all directed paths from the source to the sink of the product of linear functions that labeled the edges of the path. It is clear that an ABP with d + 1 levels computes a homogeneous polynomial of degree d. Lemma 5.2. There is a deterministic polynomial-time algorithm that on input k homogeneous ABPs of the same degree, computes the space of linear dependencies amongst the k ABPs. Proof. Suppose the k ABPs define polynomials P 1,..., P k in F{x 1,..., x n }. Let u, v denote new formal variables, and for each α 1,..., α k F, consider the polynomial P in F{x 1,..., x n, u, v} computed by the ABP with source node s and sink node t and for each i = 1, 2,..., k, an edge from s to the source node of P i labelled u, and an edge from the sink node of P i to t labelled α i v. It is easy to see that α 1 P α k P k 0 P 0 Now, apply the Raz-Shpilka identity testing algorithm [10, Sec 2.2] to P, reducing P to a ABP P of depth 2, with the guarantee that P 0 iff P 0. In addition, P has the following structure: the edges between the source node and level 1 nodes are labelled with linear expressions over new variables x 1,..., x m and the edges between the level 1 nodes and the sink node are labelled with α 1 v,..., α k v respectively. Now, we can expand the polynomial computed by P and by solving the linear system over the variables x 1v,..., x mv compute the linear space comprising all α 1,..., α k such that P (and thus P ) computes the zero polynomial. Corollary 5.3. There is a deterministic polynomial-time algorithm that on input k arithmetic formulas, computes the space of linear dependencies amongst the k formulas. Proof. Let d denote the maximal depth of the input formula. Our algorithm will first transform each of the given formula to at most d + 1 ABPs and for each i = 0, 1,..., d, compute the linear dependencies for the k ABPs computing the homogeneous part of degree i for each input formula. The final output is the intersection of the d+1 linear spaces. Let f be a homogeneous polynomial of degree d on n variables x 1,..., x n. A k-term is an ordered sequence of k variables amongst x 1,..., x n (allowing repetitions). For each 0 k d, we define a matrix M k (f) F nk n d k as follows: there is a row for each k-term τ and each (d k)- term σ, and the (τ, σ)-th entry of M k (f) is the coefficient of monomial τσ in f.

6 Theorem 5.4 ([9]). The smallest ABP computing f has size d k=0 rank(m k(f)). Theorem 5.5. There is a deterministic polynomial-time algorithm that on input an ABP outputs a smallest equivalent ABP. Proof. For k = 0, 1,..., d, where d is the degree of the polynomial computed by the input ABP B, let v 1,..., v t be the vertices of the ABP in the k th level. We define the matrices L k and R k as follows: L k will have a row for each k-term and a column for each 0 i t and R k will have a row for each 0 i t and a column for each (d k)-term. For a k-term τ and i, (τ, i)-th entry of L k is the coefficient of τ in the polynomial computed by the restricted ABP with sink v i. For a (d k)-term σ and i, the (i, σ)-th entry of R k [i, σ] is the coefficient of σ in the polynomial computed by the restricted ABP with source v i. It is easy to verify that M k (f) = L k R k and thus rank(m k (f)) = min{rank(l k ), rank(r k )}. In fact, the lower bound in Theorem 5.4 follows from this and the observation that rank(l k ), rank(r k ) t. Using the algorithm from Lemma 5.2, we may compute a basis for the polynomials computed by the t restricted ABPs with sink v i, for i = 1,..., t, along with a representation of the remaining polynomials as a linear combination of the basis functions; we call v i a basis vertex if the polynomial computed by the restricted ABP with sink v i is part of the basis. We eliminate each vertex v i that is not a basis vertex, and each edge connecting v i to a vertex u in the k+1 st level is replaced by edges connecting u to the appropriate linear combination of the basis vertices in the k th level. Now, we have a new ABP B computing the same polynomial as B, except B has exactly rank(l k ) vertices in level k. By repeating the same procedure in a bottom-up manner, we obtain a new ABP B computing the same polynomial as B and where there are at most min{rank(l k ), rank(r k )} vertices in the k th level for any 0 k d. It follows from Theorem 5.4 that B is a smallest ABP computing the same polynomial as B. 6 Identity Testing for Noncommutative Formulas In this section we apply our randomized algorithm for black box identity testing to the case when the input is represented by an arithmetic formula. Like in the case of commutative identity testing, we obtain an algorithm in the complexity class cornc. We also remark on a possible partial derandomization of this algorithm, if certain lower bounds on the class of matrix identities can be proved. 6.1 Parallel evaluation of arithmetic formulas We begin with a variant of a theorem by Brent, Kuck, and Maruyama [3] regarding parallel evaluation of arithmetic formulas. It is a straightforward generalization of their result for the noncommutative scenario. For completeness, we include a sketch of the proof. We assume that we have a representation of F that allows addition in time O(log F ) and multiplication in time O(log 2 F ). Lemma 6.1. There is a parallel randomized algorithm that, given a noncommutative formula p(x 1,..., x n ) of size s, and matrices M 1,..., M n F k k, computes the matrix p(m 1,..., M n ) in parallel in time O(log(s) log 2 (k F )) using poly(sk) processors. Proof sketch. Let T be the parse tree of formula p. The internal nodes of p are labeled by gates, and the leaves are labeled by the variables x 1,..., x n. Without loss of generality, assume that all leaves are labeled by distinct variables. (This does not affect the size of the formula.) By a simple lemma of Brent [4], if n 3, there is a node v of T such that the subtree T v of T rooted at v has size at least 2n/3, but both T vl and T vr have size at most 2n/3, where vl, vr are the children of v. Let T y be the tree obtained from T by contracting all descendants of v and labelling the new leaf at v with a new formal variable y. To evaluate p, we recursively evaluate in parallel all of T vl, T vy, and T y over the input matrices, treating y as a formal variable. The formal polynomial represented by T y has the form AyB +C, where A, B, and C are polynomials in x 1,..., x n only. We show that all of A, B, and C can be represented by trees T A, T B and T C of total size at most 2n/3. Let θ 1,..., θ k denote the sequence of operations on the path from y to the root of T y. Let C i denote the subtree of θ i that does not contain y. It is not difficult to check that T A, T B and T C can be constructed as follows: 1. The tree T A is the product of all C i such that θ i = and C i is a left child of θ i. 2. The tree T B is the product of all C i such that θ i = and C i is a right child of θ i. 3. The tree T C is obtained from T y by setting y = 0. After all of T A, T B, T C and T v have been evaluated, we are left with performing two matrix multiplications and one matrix addition. These can be done in parallel in time O(log 2 (k F )). The processor and time complexity follow easily. Given a formula of size s, we can compute a field extension F of F containing at least s elements in zero-error probabilistic time poly( F, log s) [13]. This observation,

7 together with Theorem 4.2 and Lemma 6.1 gives the following: Theorem 6.2. Fix a finite field F. Noncommutative arithmetic formula identity testing over F is in cornc. 6.2 Towards a derandomization For a fixed field F, let k(s) denote the smallest k such that no noncommutative ABP of size s is a PI for F k k. We observe that given a bound on k(s), Lemma 4.1 gives the following black-box randomized algorithm for identity testing of ABPs. Given a polynomial p F[Y 0, Y 1 ] represented by an ABP of size s, choose random matrices M 0, M 1 T k(s) k(s), where T is a subset of F (or of a field extension of F) of size at least s/ɛ, evaluate p(m 0, M 1 ), and accept if p evaluates to the zero matrix. This test requires (k(s)) 2 log(s/ɛ) random bits. (Note that this can be extended to n variate polynomials by the argument used in the proof of Theorem 4.2; the randomness becomes (k(s log n)) 2 log(s log n/ɛ) random bits.) The Amistur-Levitzki Theorem yields the bound k(s) s/2, and does not give any improvement over our results from Section 4.1. However, it appears that all known examples of PI for k k matrices have ABP size that is exponential in k. Although we are unable to prove a general upper bound for k(s), we illustrate this for two well known classes of identities. The best known identity for F k k is the standard identity s 2k (x 1,..., x 2k ) = 0, where s n (x 1,..., x n ) = σ Per(n) sign(σ)x σ(1)... x σ(n). The standard identity is a special case of a more general class of identities called normal identities. A polynomial p(x 1,..., x t, y 1,..., y n ) is t-normal if it is multilinear and if for all 1 i < j t, p vanishes under the substitution x i = x j. The standard polynomial s n is n-normal. The following lemma is an easy application of Theorem 5.4, using standard properties of normal polynomials ([11], Section 1.2). Lemma 6.3. Every t-normal polynomial has ABP size at least 2 t. Another well known identity for F n n is the identity of algebraicity a n (x, y 1,..., y n+1 ) = σ Per(n) y 1x σ(1) y 2... y n x σ(n) y n+1. Lemma 6.4. The polynomial a n has ABP size Ω(2 n /n 5/2 ). Proof sketch. We show that there exists a k such that rank(m k (a n )) = Ω(2 n /n 5/2 ). Let S t be the collection of all subsets of [n] of size n/2 whose entries sum up to t. By the pigeonhole principle, there must exist a value of t such that S t > ( n n/2 ) /n 2 = Ω(2 n /n 5/2 ). Fix this t. Let k = t + n/2. There is a submatrix N k of M k (a n ) that is decomposable into S t S t blocks, such that its diagonal blocks are nonzero but all the other blocks are zero. It must then hold that rank(m k (a n )) rank(n k ) S t. The rows of N k are indexed by terms of the form y 1 x s1 y 2 x s2... y k/2 x s k/2, where {s 1,..., s k/2 } S t. The columns are indexed by terms of the form y k/2 x s k/ x s n y n+1, where [n] {s k/2 +1,..., s n } S t. Finally, we note that there exist noncommutative algebras admitting identities whose formula size is polynomial in the dimension; for example the algebra of k k upper triangular matrices over a field F satisfies the identity (x 1 x 2 x 2 x 1 )(x 3 x 4 x 4 x 3 )... (x 2k 1 x 2k x 2k x 2k 1 ). 7 Acknowledgments We thank Steve Chien, Ran Raz, Luca Trevisan, and Salil Vadhan for helpful conversations. References [1] S. A. Amistur and J. Levitzki. Minimal identities for algebras. In Proceedings of the of the American Mathematical Society, volume 1, pages , [2] A. Bogdanov and H. Wee. A stateful implementation of a random function supporting parity queries over hypercubes. In Proceedings of the 8th International Workshop on Randomization and Computation (RANDOM), pages , [3] R. Brent, D. Kuck, and K. Maruyama. The parallel evaluation of arithmetic expressions without division. IEEE Transactions on Computers, C-22: , [4] R. P. Brent. The parallel evaluation of general arithmetic expressions. Journal of the ACM, 21(2): , [5] S. Chien and A. Sinclair. Algebras with polynomial identities and computing the determinant. In Proceedings of the 45th IEEE Symposium on Foundations of Computer Science, [6] V. Drensky and E. Formanek. Polynomial Identity Rings. Advanced Courses in Mathematics CRM Barcelona. Birkhauser, [7] V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. In Proceedings of the 35th ACM Symposium on Theory of Computing, pages , 2003.

8 [8] K. Maruyama. The parallel evaluation of matrix expressions. Technical Report RC 4380, IBM Research Center, Yorktown Heights, New York, May [9] N. Nisan. Lower bounds for non-commutative computation. In Proceedings of the 23rd ACM Symposium on Theory of Computing, pages , [10] R. Raz and A. Shpilka. Deterministic polynomial identity testing in non commutative models. In Proceedings of the 17th Conference on Computational Complexity, pages , [11] L. H. Rowen. Polynomial Identities in Ring Theory. Academic Press, [12] J. T. Schwartz. Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM, 27(4): , [13] M. Sudan. Lecture notes on algebra. madhu/ft01/scribe/algebra.ps, September [14] R. E. Zippel. Probabilistic algorithms for sparse polynomials. In Proceedings of EUROSAM 79, pages , 1979.

Lecture 2: January 18

Lecture 2: January 18 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 2: January 18 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,

More information

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial

More information

Determinant Versus Permanent

Determinant Versus Permanent Determinant Versus Permanent Manindra Agrawal Abstract. We study the problem of expressing permanent of matrices as determinant of (possibly larger) matrices. This problem has close connections with complexity

More information

Learning Restricted Models of Arithmetic Circuits

Learning Restricted Models of Arithmetic Circuits Learning Restricted Models of Arithmetic Circuits Adam R. Klivans Department of Computer Science University of Texas at Austin Austin, TX 78712-1188 klivans@cs.utexas.edu Amir Shpilka Faculty of Computer

More information

Witnessing Matrix Identities and Proof Complexity

Witnessing Matrix Identities and Proof Complexity Witnessing Matrix Identities and Proof Complexity Fu Li Iddo Tzameret August 4, 2016 Abstract We use results from the theory of algebras with polynomial identities PI algebras to study the witness complexity

More information

1 The Low-Degree Testing Assumption

1 The Low-Degree Testing Assumption Advanced Complexity Theory Spring 2016 Lecture 17: PCP with Polylogarithmic Queries and Sum Check Prof. Dana Moshkovitz Scribes: Dana Moshkovitz & Michael Forbes Scribe Date: Fall 2010 In this lecture

More information

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS Electronic Colloquium on Computational Complexity, Report No. 97 (2010) ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS IDDO TZAMERET Abstract. We study possible formulations of algebraic propositional proof

More information

Deterministic identity testing for sum of read-once oblivious arithmetic branching programs

Deterministic identity testing for sum of read-once oblivious arithmetic branching programs Deterministic identity testing for sum of read-once oblivious arithmetic branching programs Rohit Gurjar, Arpita Korwar, Nitin Saxena, IIT Kanpur Thomas Thierauf Aalen University June 18, 2015 Gurjar,

More information

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we

More information

Tensor-Rank and Lower Bounds for Arithmetic Formulas

Tensor-Rank and Lower Bounds for Arithmetic Formulas Electronic Colloquium on Computational Complexity, Report No. 2 (2010) Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor

More information

The Strength of Multilinear Proofs

The Strength of Multilinear Proofs The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system

More information

Polynomial Identity Testing

Polynomial Identity Testing Polynomial Identity Testing Amir Shpilka Technion and MSR NE Based on joint works with: Zeev Dvir, Zohar Karnin, Partha Mukhopadhyay, Ran Raz, Ilya Volkovich and Amir Yehudayoff 1 PIT Survey Oberwolfach

More information

Improved Polynomial Identity Testing for Read-Once Formulas

Improved Polynomial Identity Testing for Read-Once Formulas Improved Polynomial Identity Testing for Read-Once Formulas Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree)

More information

Determinant versus permanent

Determinant versus permanent Determinant versus permanent Manindra Agrawal Abstract. We study the problem of expressing permanents of matrices as determinants of (possibly larger) matrices. This problem has close connections to the

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

Algebras with Polynomial Identities and Computing the Determinant

Algebras with Polynomial Identities and Computing the Determinant Algebras with Polynomial Identities and Computing the Determinant Steve Chien Microsoft Research 1065 La Avenida Mountain View, CA 94043, U.S.A. schien@microsoft.com Alistair Sinclair Computer Science

More information

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities On the Structure and Complexity of Symbolic Proofs of Polynomial Identities Iddo Tzameret Tel Aviv University, Tel Aviv 69978, Israel Abstract A symbolic proof for establishing that a given arithmetic

More information

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not

More information

Problem Set 2. Assigned: Mon. November. 23, 2015

Problem Set 2. Assigned: Mon. November. 23, 2015 Pseudorandomness Prof. Salil Vadhan Problem Set 2 Assigned: Mon. November. 23, 2015 Chi-Ning Chou Index Problem Progress 1 SchwartzZippel lemma 1/1 2 Robustness of the model 1/1 3 Zero error versus 1-sided

More information

Tensor-Rank and Lower Bounds for Arithmetic Formulas

Tensor-Rank and Lower Bounds for Arithmetic Formulas Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor A : [n] r F with tensor-rank n r (1 o(1)), where r = r(n) log n/

More information

The Power of Depth 2 Circuits over Algebras

The Power of Depth 2 Circuits over Algebras The Power of Depth 2 Circuits over Algebras Chandan Saha, Ramprasad Saptharishi 2 and Nitin Saxena 3 Indian Institute of Technology, Kanpur 20806, India csaha@iitk.ac.in 2 Chennai Mathematical Institute,

More information

Lower Bounds for Testing Bipartiteness in Dense Graphs

Lower Bounds for Testing Bipartiteness in Dense Graphs Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due

More information

THE BLACK-BOX QUERY COMPLEXITY OF POLYNOMIAL SUMMATION

THE BLACK-BOX QUERY COMPLEXITY OF POLYNOMIAL SUMMATION THE BLACK-BOX QUERY COMPLEXITY OF POLYNOMIAL SUMMATION Ali Juma, Valentine Kabanets, Charles Rackoff, and Amir Shpilka Abstract. For any given Boolean formula φ(x 1,..., x n ), one can efficiently construct

More information

Non-commutative computations: lower bounds and polynomial identity testing

Non-commutative computations: lower bounds and polynomial identity testing Electronic Colloquium on Computational Complexity, Report No. 94 (2016) Non-commutative computations: lower bounds and polynomial identity testing Guillaume Lagarde Guillaume Malod Sylvain Perifel June

More information

Lecture 5 Polynomial Identity Testing

Lecture 5 Polynomial Identity Testing Lecture 5 Polynomial Identity Testing Michael P. Kim 18 April 2017 1 Outline and Motivation In this lecture we will cover a fundamental problem in complexity theory polynomial identity testing (PIT). We

More information

Lecture 22: Derandomization Implies Circuit Lower Bounds

Lecture 22: Derandomization Implies Circuit Lower Bounds Advanced Complexity Theory Spring 2016 Lecture 22: Derandomization Implies Circuit Lower Bounds Prof. Dana Moshkovitz 1 Overview In the last lecture we saw a proof presented by Madhu Sudan that E SIZE(2

More information

Non-commutative arithmetic circuits with division

Non-commutative arithmetic circuits with division Non-commutative arithmetic circuits with division P. Hrubeš, A. Wigderson. December 2, 2013 Abstract We initiate the study of the complexity of arithmetic circuits with division gates over non-commuting

More information

Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing

Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick,

More information

November 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach

November 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach 1 Recent Results on Polynomial Identity Testing Amir Shpilka Technion Goal of talk Survey known results Explain proof techniques Give an interesting set of `accessible open questions 2 Talk outline Definition

More information

Read-Once Polynomial Identity Testing

Read-Once Polynomial Identity Testing Read-Once Polynomial Identity Testing Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

The Black-Box Query Complexity of Polynomial Summation

The Black-Box Query Complexity of Polynomial Summation The Black-Box Query Complexity of Polynomial Summation Ali Juma Department of Computer Science University of Toronto Toronto, Canada ajuma@cs.toronto.edu Charles Rackoff Department of Computer Science

More information

Polynomial Identity Testing. Amir Shpilka Technion

Polynomial Identity Testing. Amir Shpilka Technion Polynomial Identity Testing Amir Shpilka Technion 1 Goal of talk Model: Arithmetic circuits Problem: Polynomial Identity Testing Example: Depth-3 circuits Some open problems 2 Holy grail: P vs. NP Boolean

More information

Arithmetic Circuits: A Chasm at Depth Four

Arithmetic Circuits: A Chasm at Depth Four Arithmetic Circuits: A Chasm at Depth Four Manindra Agrawal Indian Institute of Technology, Kanpur V Vinay Geodesic Information Systems Ltd, Bangalore, and Chennai Mathematical Institute, Chennai August

More information

Lecture 4: LMN Learning (Part 2)

Lecture 4: LMN Learning (Part 2) CS 294-114 Fine-Grained Compleity and Algorithms Sept 8, 2015 Lecture 4: LMN Learning (Part 2) Instructor: Russell Impagliazzo Scribe: Preetum Nakkiran 1 Overview Continuing from last lecture, we will

More information

Notes for Lecture 25

Notes for Lecture 25 U.C. Berkeley CS278: Computational Complexity Handout N25 ofessor Luca Trevisan 12/1/2004 Notes for Lecture 25 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on

More information

A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle

A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle Maurice J. Jansen Kenneth W.Regan November 10, 2006 Abstract We prove a non-linear lower bound on

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS

LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS SIAM J. COMPUT. Vol. 36, No. 5, pp. 1404 1434 c 2007 Society for Industrial and Applied Mathematics LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS ZEEV DVIR

More information

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES JOSHUA BIDERMAN, KEVIN CUDDY, ANG LI, MIN JAE SONG Abstract. In this paper we present a graph property with sensitivity Θ( n), where n = ( v 2) is the

More information

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions CS 6743 Lecture 15 1 Fall 2007 1 Circuit Complexity 1.1 Definitions A Boolean circuit C on n inputs x 1,..., x n is a directed acyclic graph (DAG) with n nodes of in-degree 0 (the inputs x 1,..., x n ),

More information

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2 CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the

More information

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 So far our notion of realistic computation has been completely deterministic: The Turing Machine

More information

Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization

Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Swastik Kopparty Shubhangi Saraf Amir Shpilka Abstract In this paper we show that the problem of deterministically

More information

DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE

DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE Matthew Anderson, Dieter van Melkebeek, and Ilya Volkovich June 20, 2014 Abstract. We present a polynomial-time deterministic

More information

Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing

Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Philipp Woelfel Dept. of Computer Science University Dortmund D-44221 Dortmund Germany phone: +49 231 755-2120 fax: +49 231 755-2047

More information

Circuits. Lecture 11 Uniform Circuit Complexity

Circuits. Lecture 11 Uniform Circuit Complexity Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall

More information

On the Exponent of the All Pairs Shortest Path Problem

On the Exponent of the All Pairs Shortest Path Problem On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty

More information

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

The complexity of acyclic subhypergraph problems

The complexity of acyclic subhypergraph problems The complexity of acyclic subhypergraph problems David Duris and Yann Strozecki Équipe de Logique Mathématique (FRE 3233) - Université Paris Diderot-Paris 7 {duris,strozecki}@logique.jussieu.fr Abstract.

More information

Determinant versus permanent

Determinant versus permanent Determinant versus permanent Markus Bläser, Saarland University Draft August 24, 20:13 1 Chapter 1 Valiant s framework Throughout this lecture, F will denote some field, the underlying ground field. Let

More information

Notes on Computer Theory Last updated: November, Circuits

Notes on Computer Theory Last updated: November, Circuits Notes on Computer Theory Last updated: November, 2015 Circuits Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Circuits Boolean circuits offer an alternate model of computation: a non-uniform one

More information

Deterministically Testing Sparse Polynomial Identities of Unbounded Degree

Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Markus Bläser a Moritz Hardt b,,1 Richard J. Lipton c Nisheeth K. Vishnoi d a Saarland University, Saarbrücken, Germany. b Princeton

More information

1 Locally computable randomized encodings

1 Locally computable randomized encodings CSG399: Gems of Theoretical Computer Science Lectures 3-4 Feb 20-24, 2009 Instructor: Emanuele Viola Scribe: Eric Miles Cryptography in constant depth: II & III Locally computable randomized encodings

More information

IITM-CS6845: Theory Toolkit February 3, 2012

IITM-CS6845: Theory Toolkit February 3, 2012 IITM-CS6845: Theory Toolkit February 3, 2012 Lecture 4 : Derandomizing the logspace algorithm for s-t connectivity Lecturer: N S Narayanaswamy Scribe: Mrinal Kumar Lecture Plan:In this lecture, we will

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

arxiv: v2 [cs.ds] 3 Oct 2017

arxiv: v2 [cs.ds] 3 Oct 2017 Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 3: The polynomial method Part I: Orthogonal Vectors Sebastian Krinninger Organization of lecture No lecture on 26.05. (State holiday) 2 nd exercise

More information

Notes for Lecture 11

Notes for Lecture 11 Stanford University CS254: Computational Complexity Notes 11 Luca Trevisan 2/11/2014 Notes for Lecture 11 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on the

More information

Lecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz

Lecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 4 1 Circuit Complexity Circuits are directed, acyclic graphs where nodes are called gates and edges are called

More information

Certifying polynomials for AC 0 [ ] circuits, with applications

Certifying polynomials for AC 0 [ ] circuits, with applications Certifying polynomials for AC 0 [ ] circuits, with applications Swastik Kopparty Srikanth Srinivasan Abstract In this paper, we introduce and develop the method of certifying polynomials for proving AC

More information

Theory of Computer Science to Msc Students, Spring Lecture 2

Theory of Computer Science to Msc Students, Spring Lecture 2 Theory of Computer Science to Msc Students, Spring 2007 Lecture 2 Lecturer: Dorit Aharonov Scribe: Bar Shalem and Amitai Gilad Revised: Shahar Dobzinski, March 2007 1 BPP and NP The theory of computer

More information

The Tensor Product of Two Codes is Not Necessarily Robustly Testable

The Tensor Product of Two Codes is Not Necessarily Robustly Testable The Tensor Product of Two Codes is Not Necessarily Robustly Testable Paul Valiant Massachusetts Institute of Technology pvaliant@mit.edu Abstract. There has been significant interest lately in the task

More information

Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing

Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing Michael A. Forbes Amir Shpilka March 7, 2013 Abstract Mulmuley [Mul12a] recently gave an explicit version of

More information

THE COMPLEXITY OF CONSTRUCTING PSEUDORANDOM GENERATORS FROM HARD FUNCTIONS

THE COMPLEXITY OF CONSTRUCTING PSEUDORANDOM GENERATORS FROM HARD FUNCTIONS comput. complex. 13 (2004), 147 188 1016-3328/04/030147 42 DOI 10.1007/s00037-004-0187-1 c Birkhäuser Verlag, Basel 2004 computational complexity THE COMPLEXITY OF CONSTRUCTING PSEUDORANDOM GENERATORS

More information

ON THE SIZE OF KAKEYA SETS IN FINITE FIELDS

ON THE SIZE OF KAKEYA SETS IN FINITE FIELDS ON THE SIZE OF KAKEYA SETS IN FINITE FIELDS ZEEV DVIR Abstract. A Kakeya set is a subset of F n, where F is a finite field of q elements, that contains a line in every direction. In this paper we show

More information

6.842 Randomness and Computation April 2, Lecture 14

6.842 Randomness and Computation April 2, Lecture 14 6.84 Randomness and Computation April, 0 Lecture 4 Lecturer: Ronitt Rubinfeld Scribe: Aaron Sidford Review In the last class we saw an algorithm to learn a function where very little of the Fourier coeffecient

More information

WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE JANSEN

WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE JANSEN Symposium on Theoretical Aspects of Computer Science 2010 (Nancy, France), pp. 465-476 www.stacs-conf.org WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

On enumerating monomials and other combinatorial structures by polynomial interpolation

On enumerating monomials and other combinatorial structures by polynomial interpolation Theory of Computing Systems manuscript No. (will be inserted by the editor) On enumerating monomials and other combinatorial structures by polynomial interpolation Yann Strozecki the date of receipt and

More information

Read-Once Polynomial Identity Testing

Read-Once Polynomial Identity Testing Read-Once Polynomial Identity Testing Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations

More information

Reconstruction of full rank algebraic branching programs

Reconstruction of full rank algebraic branching programs Reconstruction of full rank algebraic branching programs Vineet Nair Joint work with: Neeraj Kayal, Chandan Saha, Sebastien Tavenas 1 Arithmetic circuits 2 Reconstruction problem f(x) Q[X] is an m-variate

More information

Sums of products of polynomials of low-arity - lower bounds and PIT

Sums of products of polynomials of low-arity - lower bounds and PIT Sums of products of polynomials of low-arity - lower bounds and PIT Mrinal Kumar Joint work with Shubhangi Saraf Plan for the talk Plan for the talk Model of computation Plan for the talk Model of computation

More information

Diagonal Circuit Identity Testing and Lower Bounds

Diagonal Circuit Identity Testing and Lower Bounds Diagonal Circuit Identity Testing and Lower Bounds Nitin Saxena Hausdorff Center for Mathematics Endenicher Allee 60 D-53115 Bonn, Germany ns@hcm.uni-bonn.de Abstract. In this paper we give the first deterministic

More information

Arithmetic Circuits with Locally Low Algebraic Rank

Arithmetic Circuits with Locally Low Algebraic Rank Arithmetic Circuits with Locally Low Algebraic Rank Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick, USA mrinal.kumar@rutgers.edu 2 Department of

More information

PRGs for space-bounded computation: INW, Nisan

PRGs for space-bounded computation: INW, Nisan 0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,

More information

Separating multilinear branching programs and formulas

Separating multilinear branching programs and formulas Separating multilinear branching programs and formulas Zeev Dvir Guillaume Malod Sylvain Perifel Amir Yehudayoff Abstract This work deals with the power of linear algebra in the context of multilinear

More information

The Tree Evaluation Problem: Towards Separating P from NL. Lecture #6: 26 February 2014

The Tree Evaluation Problem: Towards Separating P from NL. Lecture #6: 26 February 2014 The Tree Evaluation Problem: Towards Separating P from NL Lecture #6: 26 February 2014 Lecturer: Stephen A. Cook Scribe Notes by: Venkatesh Medabalimi 1. Introduction Consider the sequence of complexity

More information

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany Santaló s Summer School, Part 3, July, 2012 joint work with Martijn Baartse (work supported by DFG, GZ:ME 1424/7-1) Outline 1 Introduction 2 Long transparent proofs for NP R 3 The real PCP theorem First

More information

Randomness and non-uniformity

Randomness and non-uniformity Randomness and non-uniformity JASS 2006 Course 1: Proofs and Computers Felix Weninger TU München April 2006 Outline Randomized computation 1 Randomized computation 2 Computation with advice Non-uniform

More information

1 Last time and today

1 Last time and today COMS 6253: Advanced Computational Learning Spring 2012 Theory Lecture 12: April 12, 2012 Lecturer: Rocco Servedio 1 Last time and today Scribe: Dean Alderucci Previously: Started the BKW algorithm for

More information

DRAFT. Algebraic computation models. Chapter 14

DRAFT. Algebraic computation models. Chapter 14 Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the

More information

Sparsity of Matrix Canonical Forms. Xingzhi Zhan East China Normal University

Sparsity of Matrix Canonical Forms. Xingzhi Zhan East China Normal University Sparsity of Matrix Canonical Forms Xingzhi Zhan zhan@math.ecnu.edu.cn East China Normal University I. Extremal sparsity of the companion matrix of a polynomial Joint work with Chao Ma The companion matrix

More information

Asymptotically Optimal Hitting Sets Against Polynomials

Asymptotically Optimal Hitting Sets Against Polynomials Asymptotically Optimal Hitting Sets Against Polynomials Markus Bläser 1, Moritz Hardt 2, and David Steurer 2 1 Saarland University, Saarbrücken, Germany 2 Princeton University, Princeton, NJ Abstract.

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

Notes for Lecture 3... x 4

Notes for Lecture 3... x 4 Stanford University CS254: Computational Complexity Notes 3 Luca Trevisan January 18, 2012 Notes for Lecture 3 In this lecture we introduce the computational model of boolean circuits and prove that polynomial

More information

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof

More information

Approximating maximum satisfiable subsystems of linear equations of bounded width

Approximating maximum satisfiable subsystems of linear equations of bounded width Approximating maximum satisfiable subsystems of linear equations of bounded width Zeev Nutov The Open University of Israel Daniel Reichman The Open University of Israel Abstract We consider the problem

More information

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ). CMPSCI611: Verifying Polynomial Identities Lecture 13 Here is a problem that has a polynomial-time randomized solution, but so far no poly-time deterministic solution. Let F be any field and let Q(x 1,...,

More information

Short Proofs for the Determinant Identities

Short Proofs for the Determinant Identities Short Proofs for the Determinant Identities Pavel Hrubeš Iddo Tzameret Abstract We study arithmetic proof systems P c (F) and P f (F) operating with arithmetic circuits and arithmetic formulas, respectively,

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Notes on Complexity Theory Last updated: December, Lecture 27

Notes on Complexity Theory Last updated: December, Lecture 27 Notes on Complexity Theory Last updated: December, 2011 Jonathan Katz Lecture 27 1 Space-Bounded Derandomization We now discuss derandomization of space-bounded algorithms. Here non-trivial results can

More information

Lecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Lecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak; Topics in Theoretical Computer Science April 18, 2016 Lecturer: Ola Svensson Lecture 8 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

Expander Construction in VNC 1

Expander Construction in VNC 1 Expander Construction in VNC 1 Sam Buss joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Prague Workshop on Bounded Arithmetic November 2-3, 2017 Talk outline I. Combinatorial construction

More information